Despite the growing consumerisation of IT, the majority (63 per cent) of employees in the UK say that corporate IT is failing to secure all personal devices brought into the business, according to AppSense.

The research, which surveyed 1,000 UK employees, also revealed that 67 per cent do not ensure that they comply to, or they do not know of, any specific guidelines that are in place with regards to the use of personal devices for work purposes.

In addition, only a quarter (25 per cent) of workers are totally confident that their personal device had been secured by their IT departments and over a fifth (21 per cent) admitted that they do not even alert their IT departments to the fact that they use personal devices for work purposes – putting their companies at further security risk.

“Information security is understandably of great concern to IT professionals and this research underlines the central position this should take when deciding on corporate IT policy,” said Nick Lowe, VP of Sales and GM EMEA, AppSense. “However, what this research makes clear is that while many have the best of intentions, there are still prominent gaps between where IT departments are in securing users and devices and where they should be.”

In the same study AppSense also surveyed 100 UK-based IT decision makers (ITDMs), of whom 46% admitted to not having a clearly defined bring your own device (BYOD) policy in place for mobile phones and tablets. This was in spite of the fact that ITDMs stated that 60% of the devices that they currently provide to employees are mobile in nature.

For those ITDMs who do have a BYOD policy in place things looked equally dire with only one per cent able to say that three quarters or more of their workforce are actively enrolled within their organisation’s BYOD programme – indicating that security concerns with regards to the consumerisation of IT remains a big challenge for ITDMs.

This was confirmed by ITDM respondents who stated that implementing an appropriate security model (77 per cent), developing appropriate BYOD IT policy (67 per cent) and meeting end-user expectations around corporate IT experience (51 per cent) were the top three concerns faced today.

“While security will always be a priority for IT departments, the right balance between security and a consistent and acceptable end-user experience must be sought in order to promote productivity. Workers have become accustomed to going about their jobs in a way that works best for them, and by putting barriers in place, users will try to find a work around. This is demonstrated by 21 per cent of end-users deciding not alert their IT department to the use of a personal device to access corporate data,” concluded Lowe.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.